Common Contracts

1 similar null contracts

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
December 4th, 2009
  • Filed
    December 4th, 2009

Abstract. We discuss the relationship between ID-based key agree- ment protocols, certificateless encryption and ID-based key encapsula- tion mechanisms. In particular we show how in some sense ID-based key agreement is a primitive from which all others can be derived. In doing so we focus on distinctions between what we term pure ID-based schemes and non-pure schemes, in various security models. We present security models for ID-based key agreement which do not “look natural” when considered as analogues of normal key agreement schemes, but which look more natural when considered in terms of the models used in cer- tificateless encryption. We illustrate our models and constructions with two running examples, one pairing based and one non-pairing based. Our work highlights distinctions between the two approaches to certificateless encryption, and adds to the debate about what is the “correct” security model for certificateless encryption.

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.